• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29 Educators providing Information Security (IS) courses in Caerphilly delivered Live Online

Kokoro Shotokan Karate

kokoro shotokan karate

Cardiff

Kokoro Karate is a traditional Shotokan karate school with a modern approach to practical applications. At Kokoro we take an holistic approach to our training, developing mind, body and spirit. We believe this empowers our students and develops mindfulness, self-confidence, heath, fitness, concentration, co-ordination and respect. The Class Instructor is Sensei Paul Cooper 4th Dan. Paul has over thirty years of experience, achieving his black belt in 1987 with Hanshi Shiro Asano 9th Dan, who was a direct student of Nakayama, the founder of the JKA. Paul has trained internationally with many world respected teachers in his karate career grading with the SKIF, SSKA and the Conroy Karate Group. We are governed by NAKMAS (National Association of Karate and Martial Arts Schools), the only martial arts body in Britain to hold a Government recognised British Standards Quality Kitemark (BS:EN ISO 9001:2015) via the British Standards Insitution (BSI) and is accredited to the Equality Standard: A Framework for Sport at Intermediate level. Paul is a senior instructor and examiner for the NAKMAS Governing Body and the club operates within the strict policies and guidelines laid down by them. Our dojo is at The Old Library Sports & Community Centre, Singleton Road, Splott, Cardiff, CF24 2ET Training is suitable for men, women and children aged ten/eleven years and over. We do allow children (primary school age) by prior agreement to train if a parent or guardian trains as well in the senior class, we also offer our Kokoro Tigers programme that is designed for children from 4/5 (school reception class) to 10/11 years old. Shotokan training is divided into three parts: kihon (basics), kata (forms or patterns of moves), and kumite (sparring). Techniques in kihon and kata are characterised by deep, long stances that provide stability, enable powerful movements, and strengthen the legs. Shotokan is regarded as a dynamic martial art as it develops anaerobic, powerful techniques as well as developing speed.

Karen Blake Coaching

karen blake coaching

0.0(4)

Merthyr Tydfil

Welcome to Karen Blake Coaching, your dedicated partner in conquering personal and professional challenges. Located in the vibrant city of Merthyr Tydfil, South Wales, we specialise in empowering individuals through expert career coaching and training. Our tailored solutions are designed to supercharge your career development, whether you're returning to work or striving to progress further in your chosen career. Ready to unlock your full potential? Let's embark on this journey together. Our Journey: Conquering Challenges Like many, we've encountered significant personal, career, and health challenges. Yet, instead of surrendering, we triumphed over these obstacles through unwavering self-motivation and determination. Fuelled by optimism and a laser-focused mindset, we achieved the work-life balance we yearned for. We recognise that you may also encounter similar hurdles, which can sometimes erode motivation and obscure the valuable lessons they hold. When challenges persist without resolution, they can evolve into persistent issues, causing disillusionment and discontent. Our Commitment: Sharing Our Story We now have the good fortune of being able to discuss our struggles and how we overcame them in a way that satisfies our requirements both personally and professionally while maintaining our independence. Our hope is that by sharing our story, we will encourage people to seek help when they need it and to recognise their worth, regardless of how little their first steps may have been.  Karen Blake, MCDI, MIEP, and MInstLM  Director, Karen Blake Coaching Why We Do What We Do At Karen Blake Coaching, our mission is driven by a profound understanding of the roadblocks that hinder career progression and their profound impact on confidence, motivation, and performance. We are passionate about assisting those who aspire to succeed but feel hindered by these challenges. We firmly believe that everyone deserves the opportunity to achieve their goals, and this belief led to the creation of Karen Blake Coaching. Our extensive range of services is designed to empower learners from diverse backgrounds and personal circumstances. Our clients come from various walks of life, including: * Lone Parents: Juggling home and childcare responsibilities while striving to maintain and advance their skills. * Redundant Employees: Facing uncertainty about finding support and lacking essential skills such as CV writing, job interview preparation, and re-entering the workforce after an extended absence. * School Leavers/NEETs: Seeking guidance and support in choosing the right career path and transitioning into the world of employment. * Individuals with Concerns: Who may have reservations about traditional classroom environments that may be hindering their personal and professional development. * Employees Aspiring to Advance: Those who are eager to progress in their careers but may lack confidence in their skills and abilities * Individuals with Long-term Health Conditions: Who are uncertain about how to fit into work environments while accessing ongoing professional development. * First-line Managers: Hesitant to seek help from senior line managers in advancing their careers. * Veterans and Early Service Leavers: Looking to apply their military skills and experiences to civilian jobs and self-employment Whether you're currently in an unhappy job or facing challenges in your career, we're here to work alongside you to find solutions. Our dedicated career coaches are committed to helping you overcome these obstacles, no matter what stage of your career journey you're in. We provide powerful and effective career advice, guidance, and coaching to propel you forward. Services We Offer: Career Coaching: Personalised coaching to help individuals excel in their careers, from guidance on job search strategies to career advancement. Mentoring: Expert mentoring to support personal and professional development, providing guidance and insight for growth. Accredited and Non-Accredited Qualifications Access our diverse range of courses in Coaching and Mentoring, Life Coaching, Education and Training, as well as qualifications in Assessing and Advice and Guidance. Choose from accredited and non-accredited options to suit your needs. Registered Centres for WJEC and iCQ As proud registered centres for WJEC (Welsh Joint Education Committee) and iCQ (iCan Qualify - Regulated Awarding Organisation), we ensure the highest standards in delivering and assessing qualifications. This recognition speaks to our commitment to quality education and training.

Courses matching "Information Security (IS)"

Show all 72

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry

BCS Foundation Certificate in Information Security Management Principles

5.0(12)

By Nemstar Ltd

This CISMP course and exam is for anyone wishing to progress their career in the rapidly expanding fields of Information Security, risk and cyber especially within the UK public sector.

BCS Foundation Certificate in Information Security Management Principles
Delivered OnlineFlexible Dates
£1,914

Nemstar's CISSP Programme

5.0(12)

By Nemstar Ltd

Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,

Nemstar's CISSP Programme
Delivered OnlineFlexible Dates
£2,754

CND - EC Council Official Certified Network Defender

5.0(12)

By Nemstar Ltd

This is the perfect launch pad for a technical career in Cyber Security and fully prepares every delegate for the prestigious Certified Ethical Hacking (CEH) Course that comes next on the Cyber & Hacking Learning Pathways by Nemstar.

CND - EC Council Official Certified Network Defender
Delivered OnlineFlexible Dates
£3,294

SOC - EC Council Official SOC Analyst (CSA) with exam

5.0(12)

By Nemstar Ltd

Classroom based, instructor led workshop with proctor at home exam. The lab-intensive Certified SOC Analyst (CSA) program emphasizes the holistic approach to deliver the advanced knowledge of how to identify, validate and defend against cyber-attacks.

SOC - EC Council Official SOC Analyst (CSA) with exam
Delivered OnlineFlexible Dates
£2,394

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers Privacy Officers Health IS Managers Risk Managers Information Security Managers Compliance and Privacy Officers Overview Upon completion, the student will be ready to take the Certified Healthcare Information Systems Security Practitioner exam by mile2. In addition, at the end of the CHISSP course, the student will be versed with best practices in the healthcare industry and will be able to establish a framework with current best practices in respects to privacy, regulation and risk management. The Certified Healthcare IS Security Practitioner, C)HISSP certification course covers the skills and knowledge to implement the best IT healthcare practices, as well as, regulatory compliance and standards in the healthcare industry. Because of growing industry regulations and privacy requirements in the healthcare industry, the C)HISSP was developed by Mile2. Graduates of this course have become vital in managing and protecting healthcare data and are tasked to protect patient information by implementing, managing, and assessing proper IT controls for patient health information integrity. Course Outline Intro to the Healthcare Industry Regulatory Environment Healthcare Privacy and Security Policies Information Governance Risk Management Third-Party Risk Management

C)HISSP-Certified Health Information Systems Security Practitioner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Lexcel Standard Training Requirements Course

By DG Legal

This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.

Lexcel Standard Training Requirements Course
Delivered Online + more
£225 to £300

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Information Security Management Principle

5.0(10)

By GBA Corporate

Overview Objective Understand the requirement of Information Security Concepts and Definitions of Information Security Management Systems Deeply Analysing the policies, Standards and procedures How to deliver a balanced ISMS and following its security procedures Analysing the Information risk management Evaluating the organisational responsibilities Understanding the Information security controls Scrutinising Legal framework Techniques of Cryptographic models

Information Security Management Principle
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

EC-Council Certified Chief Information Security Officer (C|CISO)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for the aspiring or sitting upper-level manager striving to advance his or her career by learning to apply their existing deep technical knowledge to business problems. In this course, students will learn in-depth content in each of the 5 CCISO Domains Domain 01 - Governance Define, Implement, Manage, and Maintain an Information Security Governance Program Information Security Drivers Establishing an information security management structure Laws/Regulations/Standards as drivers of Organizational Policy/Standards/Procedures Managing an enterprise information security compliance program Risk Management Risk mitigation, risk treatment, and acceptable risk Risk management frameworks NIST Other Frameworks and Guidance (ISO 31000, TARA, OCTAVE, FAIR, COBIT, and ITIL) Risk management plan implementation Ongoing third-party risk management Risk management policies and processes Conclusion Domain 2 - Security Risk Management, Controls, & Audit Management INFORMATION SECURITY CONTROLS COMPLIANCE MANAGEMENT GUIDELINES, GOOD AND BEST PRACTICES AUDIT MANAGEMENT SUMMARY Domain 03 - Security Program Management and Operations PROGRAM MANAGEMENT OPERATIONS MANAGEMENT Summary Domain 04 - Information Security Core Concepts ACCESS CONTROL PHYSICAL SECURITY NETWORK SECURITY ENDPOINT PROTECTION APPLICATION SECURITY ENCRYPTION TECHNOLOGIES VIRTUALIZATION SECURITY CLOUD COMPUTING SECURITY TRANSFORMATIVE TECHNOLOGIES Summary Domain 05 - Strategic Planning, Finance, Procurement and Vendor Management STRATEGIC PLANNING Designing, Developing, and Maintaining an Enterprise Information Security Program Understanding the Enterprise Architecture (EA) FINANCE PROCUREMENT VENDOR MANAGEMENT Summary

EC-Council Certified Chief Information Security Officer (C|CISO)
Delivered OnlineFlexible Dates
£3,495